US9002792B2 - Confirming data consistency in a data storage environment - Google Patents
Confirming data consistency in a data storage environment Download PDFInfo
- Publication number
- US9002792B2 US9002792B2 US13/680,265 US201213680265A US9002792B2 US 9002792 B2 US9002792 B2 US 9002792B2 US 201213680265 A US201213680265 A US 201213680265A US 9002792 B2 US9002792 B2 US 9002792B2
- Authority
- US
- United States
- Prior art keywords
- data
- hash
- data storage
- hash value
- site
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G06F17/30575—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/178—Techniques for file synchronisation in file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
- G06F16/137—Hash-based
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/82—Solving problems relating to consistency
Definitions
- the present disclosure generally relates to systems and methods for confirming data consistency in a data storage environment. Particularly, the present disclosure relates to systems and methods for efficiently confirming data consistency between two or more network connected data storage sites in a data storage subsystem or information handling system, without, for example, consuming too significant amount of network bandwidth between the data sites, and which may be particularly useful in systems with relatively slower network links or connections.
- An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information.
- information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated.
- the variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications.
- information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
- One such method of protecting information in an information handling system involves replicating or sharing information so as to ensure consistency between redundant resources, such as data storage devices, including but not limited to, disk drives, solid state drives, tape drives, etc. Replication of information, or data, is possible across various components communicatively coupled through a computer network, so the data storage devices may be, and often desirably are, located in physically distant locations.
- data replication particularly remote data replication, is to prevent damage from failures or disasters that may occur in one location, and/or in case such events do occur, improve the ability to recover the data.
- CRCs cyclic redundancy checks
- the data at one of the locations may become invalid (e.g., incorrect) over time for any number of explainable or unexplainable reasons.
- One manner by which it can be confirmed that data from a first site is consistent with data at a second site is to resend the data from one of the sites to the other and verify the data matches that stored in the other site or simply rewrite the data at the other site.
- this can obviously put a significant strain on the available network bandwidth between the two sites, which may otherwise be used for other communication between the sites, such as initial replication.
- the demand on bandwidth may be further compounded where there are numerous data storage sites scattered over various remote locations, each attempting to confirm validity of its data.
- the present disclosure in one embodiment, relates to a method for confirming the validity of replicated data at a data storage site.
- the method includes utilizing a hash function, computing a first hash value based on first data at a first data storage site and utilizing the same hash function, computing a second hash value based on second data at a second data storage site, wherein the first data had previously been replicated from the first data storage site to the second data storage site as the second data.
- the method also includes comparing the first and second hash values to determine whether the second data is a valid replication of the first data.
- the first and second data storage sites are remotely connected by a network.
- the method may include transmitting either the first or second hash values via the network for comparing with the other hash value.
- the hash function may also be transmitted via the network from either the first or second data storage site to the other storage site, which can help ensure the same hash function is used be each.
- a data structure such as a table, may be provided for storing a plurality of hash functions, each being available for use by the first and second data storage sites.
- the method may further include selecting the hash function for use from the table for utilization in computing the first and second hash values.
- the first data may be modified based on seed data prior to computing the first hash value and the second data may be modified based on the same seed data prior to computing the second hash value.
- the seed data may also be transmitted via the network from either the first or second data storage site to the other, which can help ensure the same seed data is used be each.
- the process can be repeated any suitable number of times, each time utilizing a different hash function than in a previous time. Doing so can increase the reliability of the confirmation results.
- the process can be repeated according to any manner; however, in one embodiment, the process is repeated according to a predetermined periodic cycle.
- the present disclosure in another embodiment, relates to an information handling system.
- the system includes a first data storage site configured to compute a first hash value based on first data stored at the first data storage site, utilizing a hash function.
- the system includes a second data storage site, having data replicated from the first data storage site, and similarly configured to compute a second hash value based on second data stored at the second data storage site, utilizing the same hash function.
- Either or both of the first data storage site and second data storage site may be configured to transmit its computed hash value via a computer network to the other site for comparison of the first hash value with the second hash value so as to determine whether the second data is a valid replication of the first data.
- the first data storage site and the second data storage site are remote from one another.
- a mismatch during the comparison of the first and second hash values generally indicates that either the first or second data storage site or both includes invalid data.
- the first data storage site may be configured to modify the first data based on seed data prior to computing the first hash value
- the second data storage site may be configured to modify the second data based on the same seed data prior to computing the second hash value.
- the present disclosure in yet another embodiment, relates to a method for confirming the validity of replicated data at a data storage site.
- the method includes utilizing a hash function, computing a first hash value based on a selected portion of first data at a first data storage site and utilizing the same hash function, computing a second hash value based on a selected portion of second data at a second data storage site, wherein the first data had previously been replicated from the first data storage site to the second data storage site as the second data.
- the selected portion of replicated second data corresponds to the selected portion of first data.
- the first and second hash values may be compared so as to determine whether the selected portion of second data is a valid replication of the selected portion of first data.
- steps may be repeated any suitable number of times, each time utilizing a different selected portion of the first data and corresponding selected portion of the second data than in a previous time.
- the results of such a repeated process are substantially representative of whether the entire second data is a valid replication of the entire first data. For example, each subsequent repetition in contiguous chain of repetitions resulting in a match of the first and second hash values increases the likelihood that the second data is indeed a valid replication of the first data.
- the process can be repeated according to any manner; however, in one embodiment, the process is repeated according to a predetermined periodic cycle.
- FIG. 1 is a schematic of a disk drive system suitable with the various embodiments of the present disclosure.
- FIG. 2 is a concept drawing of a method for confirming data consistency in a data storage environment in accordance with one embodiment of the present disclosure.
- FIG. 3 is a concept drawing of a method for confirming data consistency in a data storage environment illustrating a collision.
- FIG. 4 is a flow diagram of a method for confirming data consistency in a data storage environment in accordance with one embodiment of the present disclosure.
- FIG. 5A is a concept drawing of a method for confirming data consistency in a data storage environment in accordance with another embodiment of the present disclosure.
- FIG. 5B is a concept drawing of a data confirmation process performed subsequent the method for confirming data consistency in a data storage environment of FIG. 4A .
- the present disclosure relates to novel and advantageous systems and methods for confirming data consistency in a data storage environment.
- the present disclosure relates to novel and advantageous systems and methods for efficiently confirming data consistency between two or more network connected data storage sites in a data storage subsystem or information handling system, without, for example, consuming too significant amount of network bandwidth between the data sites, and which may be particularly useful in systems with relatively slower network links or connections or in systems where there is a significant amount of other communication which should have priority to the available bandwidth.
- an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, calculate, determine, classify, process, transmit, receive, retrieve, originate, switch, store, display, communicate, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes.
- an information handling system may be a personal computer (e.g., desktop or laptop), tablet computer, mobile device (e.g., personal digital assistant (PDA) or smart phone), server (e.g., blade server or rack server), a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price.
- the information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, touchscreen and/or a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.
- RAM random access memory
- processing resources such as a central processing unit (CPU) or hardware or software control logic
- ROM read-only memory
- Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, touchscreen and/or a video display.
- I/O input and output
- the information handling system may also include one or more buses operable to transmit communications between the various
- While the various embodiments are not limited to any particular type of information handling system, the systems and methods of the present disclosure may be particularly useful in the context of a disk drive system, or virtual disk drive system, such as that described in U.S. Pat. No. 7,613,945, titled “Virtual Disk Drive System and Method,” issued Nov. 3, 2009, the entirety of which is hereby incorporated herein by reference.
- Such disk drive systems allow the efficient storage of data by dynamically allocating user data across a page pool of storage, or a matrix of disk storage blocks, and a plurality of disk drives based on, for example, RAID-to-disk mapping.
- dynamic allocation presents a virtual disk device or volume to user servers.
- the volume acts the same as conventional storage, such as a disk drive, yet provides a storage abstraction of multiple storage devices, such as RAID devices, to create a dynamically sizeable storage device.
- Data progression may be utilized in such disk drive systems to move data gradually to storage space of appropriate overall cost for the data, depending on, for example but not limited to, the data type or access patterns for the data.
- data progression may determine the cost of storage in the disk drive system considering, for example, the monetary cost of the physical storage devices, the efficiency of the physical storage devices, and/or the RAID level of logical storage devices. Based on these determinations, data progression may move data accordingly such that data is stored on the most appropriate cost storage available.
- disk drive systems may protect data from, for example, system failures or virus attacks by automatically generating and storing snapshots or point-in-time copies of the system or matrix of disk storage blocks at, for example, predetermined time intervals, user configured dynamic time stamps, such as, every few minutes or hours, etc., or at times directed by the server.
- snapshots or point-in-time copies permit the recovery of data from a previous point in time prior to the system failure, thereby restoring the system as it existed at that time.
- These snapshots or point-in-time copies may also be used by the system or system users for other purposes, such as but not limited to, testing, while the main storage can remain operational.
- a user may view the state of a storage system as it existed in a prior point in time.
- FIG. 1 illustrates one embodiment of a disk drive or data storage system 100 in an information handling system environment 102 , such as that disclosed in U.S. Pat. No. 7,613,945, and suitable with the various embodiments of the present disclosure.
- the disk drive system 100 may include a data storage subsystem 104 , which may include, but is not limited to, a RAID subsystem, as will be appreciated by those skilled in the art, and a disk manager 106 having at least one disk storage system controller.
- the data storage subsystem 104 and disk manager 106 can dynamically allocate data across disk space of a plurality of disk drives or other suitable storage devices 108 , such as but not limited to optical drives, solid state drives, tape drives, etc., based on, for example, RAID-to-disk mapping or other storage mapping technique.
- the data storage subsystem 104 may include data storage devices distributed across one or more data sites at one or more physical locations, which may be network connected. Any of the data sites may include original and/or replicated data (e.g., data replicated from any of the other data sites) and data may be exchanged between the data sites as desired.
- One such method of protecting information in an information handling system involves replicating or sharing information so as to ensure consistency between redundant resources, such as data storage devices, including but not limited to, disk drives, solid state drives, optical drives, tape drives, etc.
- redundant resources such as data storage devices, including but not limited to, disk drives, solid state drives, optical drives, tape drives, etc.
- CRC check, which is specifically designed to protect against common types of errors during communication.
- the data at one of the locations may become invalid.
- While one method of confirming that data from a first site is consistent with data at a second site is to resend the data from one site to the other, such method can put a significant strain on the available network bandwidth between the two sites. This demand on bandwidth may be further compounded where there are numerous data storage sites scattered over various remote locations, each attempting to confirm validity of its data.
- the present disclosure improves data confirmation/validation processes for data stored in a data storage system or other information handling system, such as but not limited to the type of data storage system described in U.S. Pat. No. 7,613,945.
- the disclosed improvements can provide more cost effective and/or more efficient data confirmation/validation processes, particularly in systems with relatively slower network links or connections or in systems where there is a significant amount of other communication which should have priority to the available bandwidth.
- the to-be-confirmed data at each site may be hashed using the same hash function or algorithm and the hash values may then be compared to determine whether they are equal. If they are equal, that is, the to-be-confirmed data at each site hashed to the same hash value, it is likely that the underlying data, to which the hash values correspond, is also the same and therefore valid at both sites.
- Such method for confirming data consistency between two data sites can be performed across a network using as little bandwidth as that required to send the computed hashed values from one site to the other, thereby significantly reducing the amount of bandwidth used as compared to that conventionally used for confirming data consistency between two sites by resending all the data.
- an initial step may include hashing data 202 , or a set of data 204 , at a first one of the data sites 206 , such as but not limited to, an originating or source site, utilizing a specified or predetermined hash function 208 or algorithm so as to obtain a hash value 210 or set of hash values 212 for the data or set of data, respectively.
- Data as used herein, in addition to its ordinary meaning, is meant to include any logical data unit or portion of a logical data unit, including but not limited to data blocks, data pages, volumes or virtual volumes, disk extents, disk drives, disk sectors, or any other organized data unit, or portions thereof.
- a data set is meant to include a plurality of data.
- replication data 214 at a second one of the data sites 216 such as but not limited to, a replication site, corresponding to the data 202 or a set of data 204 at the first data site may similarly be hashed so as to obtain a hash value 218 or set of hash values 220 for the replication data.
- the hash value(s) 210 , 212 from the first data site 206 may be transmitted 222 , such as via a network, including but not limited to, a LAN, WAN, or the Internet, to the second data site 216 at any time, such as but not limited to, any time after initial replication, for comparison with the hash value(s) 218 , 220 at the second data site, or vice versa, so that the hash values can be compared. If the hash value(s) from each site are equal, it is likely that the underlying data 202 , 204 at data site 206 and the underlying data 214 at data site 216 are also the same and therefore valid at both sites.
- the hash values generally consume significantly less space than the underlying data, and therefore, when sent across a network, would consume significantly less bandwidth. This contrasts with the conventional methods of confirming data consistency between sites by resending all the data from one site to the other, as discussed above, which can put a significant strain on the available network bandwidth between the two sites.
- the hash value(s) from one site need not necessarily be sent to the other, but instead, the hash value(s) from each of the sites could be sent to a third site for comparison.
- such embodiments would require two separate transmissions of the hash value(s) as opposed to a single transmission of the hash value(s) from one site to the other. Nonetheless, in some embodiments, it may be beneficial for the comparison to be performed at a third site.
- the hash function, or an identification of the hash function, used may be transmitted from one of the sites to the other.
- the hash function, or an identification of the hash function, used may be transmitted from the first data site 206 , for example, prior to computation of the hash values or at generally the same time as, and along with, the computed hash value(s) 210 , 212 .
- any number of hash functions may be provided and available for selected use at any given time; all that may be necessary is for both sites to have knowledge of, and use, the same hash function.
- a single hash function may be provided by the system and be stored at, or be accessible to, each data site. Thus, every data site will always have access to the same hash function as used by the others, and needs no further information from the other sites or elsewhere in order to identify the hash function required. In such embodiments, no transmission of the hash function between data sites would be necessary.
- the single hash function could be replaced periodically or on some other replacement basis, to help ensure data reliability and security.
- the hash function used at any given time may be based on any algorithm.
- the hash function used at any given time may be based on the actual or system time at which data confirmation between two sites is performed, and may alternate between available hash functions as time passes. While specific examples have been provided herein, the present disclosure is not limited by such examples, and any method, now known or later developed, for ensuring that a particular hash function is utilized by each data site during data confirmation may be used and is within the scope of the present disclosure.
- a hash function is generally any algorithm or subroutine that maps data, or a data set, often of large and variable lengths, to smaller data sets of a fixed length. For example only, and certainly not limited to, names of varying lengths for a plurality of people could each be hashed to a single integer.
- the values returned by a hash function are often referred to as hash values, hash codes, hash sums, checksums, or simply hashes.
- a hash function is deterministic, meaning that for a given input value, it consistently generates the same hash value.
- a hash function may map several different inputs to the same hash value, causing what is typically referred to as a “collision.” For example only, again using names as inputs, both “John Smith” and “Bob Smyth” may hash to the same hash value, depending on the hash algorithm used.
- collisions are mathematically unavoidable.
- Data 1 302 at data site 304 may hash to a hash value of “0” 310 . While typically uncommon with small data sets, although increasingly less uncommon with relatively larger amounts of data or larger data sets, at replication data site 306 , the corresponding replicated data 308 , which has been rendered invalid, may similarly produce the same hash value of “0” 312 under the same hash function, despite the fact that the replicated data 308 and the original Data 1 302 are not indeed equal.
- this type of collision may result in what is referred to herein as an “undetected error” in the corresponding data between the data sites, in that the error would continue to go undetected despite continuing efforts under such data confirmation processes.
- an undetected error in the corresponding data between the data sites, in that the error would continue to go undetected despite continuing efforts under such data confirmation processes.
- the hash values from each data site are equal, it can be very likely that the underlying data at the data sites is also the same.
- the probability of getting a collision and an undetected error may be so small that the reduction in bandwidth usage outweighs the risk of getting such a collision.
- the value of results obtained simply by hashing the data at two sites and comparing the hashed values may decrease significantly.
- the value of the above-discussed methods of data confirmation may decrease because, as the data size increases, the amount of data hashing to the same hash value increases, thereby increasing collisions. As collisions increase, the risk of undetected errors can also increase.
- the above-discussed methods for confirming data consistency may include additional steps or techniques to increase the reliability of the data confirmation results and reduce the probability that a collision resulting in an undetected error will occur. While various embodiments of the present disclosure will be described in more detail below, generally, additional embodiments may utilize hash seeds and/or hash functions with cryptographic properties, thereby exhibiting good avalanche effects, or in some cases, relatively high avalanche effects.
- the same to-be-confirmed data may be repeatedly hashed and verified over time, with each repetition including a change in one or more of: the hash function used, the hash seed used, or the starting and/or endpoint of the data hashed within the to-be confirmed data.
- a positive comparison of the hash values increases the confidence that the underlying data is, in fact, identical. For example, a positive match of hash values in a first pass will give some indication that the underlying data is likely the same. A positive match of hash values in a second pass, where the second pass includes at least one change as described above, will increase the confidence that the underlying data is the same. A positive match of hash values in a third or more pass, where each subsequent pass includes at least one change as described above, will further increase the confidence that the underlying data is the same. In general, the more passes completed and resulting in a positive match of hash values, the more likely the underlying data is, in fact, the same.
- the original data may be altered in a predetermined manner by adding a hash “seed” to the data at each site prior to, and for the purposes of, hashing the corresponding data at each site into respective hash values.
- the hash seed may be prepended to the data, appended to the data, or may be otherwise inserted at any suitable location within the data, and generally, may be combined or associated with the original data, or set of data, so as to alter the original data in a predetermined manner.
- a hash seed may be any predetermined data of any size, such as but not including, an integer, a word, or a bit, byte or any other sized chunk of organized data having a predetermined value.
- typically the hash seed value would be very small, so that the hash seed conforms with the effort to reduce bandwidth usage between the data sites for data confirmation processes.
- a hash seed could be a modifying algorithm or function that takes the original data as input and outputs modified data, which is modified according to a predefined deterministic algorithm.
- additional embodiments may utilize hash functions with cryptographic properties, which typically exhibit good avalanche effects, or in some cases, relatively high avalanche effects.
- relatively high avalanche effects are present in a hash function, whenever the input is changed, even ever so slightly (for example, by changing a single bit), the output changes significantly or even drastically.
- providing a hash seed to alter the data in a predetermined manner can cause significant changes in the computed hash values, thereby reducing the risk that a collision will occur where the underlying data is not, in fact, equivalent at both data sites.
- a process for confirming the data between two data sites utilizing a hash seed is generally carried out in much the same manner as described above with respect to FIG. 1 , with the additional step(s) of adding, combining, or otherwise associating a hash seed to the data, or a sets of data, at each data site in order to alter the data in a predetermined manner prior to hashing the data to their respective hash values.
- the hash seed may be randomly generated, or may be generated according to any suitable algorithm. Similar to the manners described above for ensuring that the same hash function is used at each data site, in one embodiment, in order to also ensure the same hash seed is utilized by each data site, the hash seed, or an identification of the hash seed, used may be transmitted from one data site to the other.
- the hash seed or an identification of the hash seed may be transmitted from a first data site to a second data site, for example, prior to computation of the hash values or at generally the same time as, and along with, the hash function used by, and the computed hash value(s) obtained at, the first data site.
- any number of hash seeds may be provided and available for selected use at any time; all that may be necessary is for both sites to have knowledge of, and use, the same hash seed.
- a hash seed could be randomly generated, as long as the same randomly generated hash seed is utilized at each data site during the data confirmation process.
- a single hash seed may be provided by the system and be stored at, or accessible to, each data site.
- every data site will always have access to the same hash seed used by the others, and needs no further information from the other sites or elsewhere in order to identify the hash seed required. In such embodiments, no transmission of the hash seed between data sites would be necessary.
- the single hash seed could be replaced periodically or on some other replacement basis, to help ensure data reliability and security.
- multiple hash seeds may be provided in, for example, a hash seed table that is directly or indirectly accessible to each of the data sites at any given time. At any given time, which hash seed is selected from the table and used may be based on any algorithm.
- the hash seed used at any given time may be based on the actual or system time at which data confirmation between two sites is performed, and may alternate between available hash seeds as time passes. While specific examples have been provided herein, the present disclosure is not limited by such examples, and any method, now known or later developed, for ensuring that a particular hash seed is utilized by each data site during data confirmation may be used and is within the scope of the present disclosure.
- the same to-be-confirmed data may additionally, be repeatedly hashed and verified over time, with each repetition including a change in one or more of characteristic of the hashing process, such as but not limited to: the hash function used, the hash seed used, or the starting and/or endpoint of the data hashed within the to-be confirmed data.
- characteristic of the hashing process such as but not limited to: the hash function used, the hash seed used, or the starting and/or endpoint of the data hashed within the to-be confirmed data.
- the data confirmation process may be repeated for any data or set of data with a different hash function.
- the data confirmation process for any data or set of data may be repeated with a different hash function and/or a different hash seed.
- repeating the data confirmation process utilizing a different hash function and/or a different hash seed will typically result in different hash values for the same original data as compared to those generated in a previously performed confirmation process. Because it is very unlikely that unequal data (e.g., original Data 1 302 and replicated data 308 in FIG.
- step 402 of the example method of FIG. 4 a hash function may be selected or provided. As discussed above, in some cases, there may only be a single hash function available, while in other cases, several available hash functions may be selected from.
- a hash seed may be selected, provided, or otherwise generated.
- the hash function and any optional hash seed may be transmitted to the destination site, so that it is ensured that the destination site has available the same hash function and hash seed.
- any other suitable method of ensuring that both sites utilize the same hash function and/or hash seed may be utilized, and transmitting the hash function and/or hash seed from the source site to the destination site is but one example.
- step 406 if a hash seed is optionally being utilized, the data or data set may be added, combined, or otherwise associated with the hash seed to alter the data or data set in a predetermined manner, as discussed above.
- step 408 a first block of the data or data set, as optionally modified by a hash seed, may be hashed using the selected or provided hash function. If the data or data set comprises more than one block, as illustrated in FIG. 4 , each block is hashed in a similar manner to that of the first block. Either as the data is hashed, or generally immediately or shortly thereafter, in step 410 , the hash values or set of hash values may be transmitted to the destination site for comparison to the hash values computed thereat, as described above.
- the process may be repeated on the same data or data set, initiating again at step 402 with a hash function being selected or provided and an optional hash seed being selected, provided, or otherwise generated.
- a hash function being selected or provided
- an optional hash seed being selected, provided, or otherwise generated.
- either or both the hash function or hash seed are changed to increase the confidence of the data confirmation process with each pass.
- the process can be performed or repeated in this manner, with varying hash functions and/or, if a hash seed is used, varying hash seeds, any suitable or desired number of times.
- the more times the process is repeated with varying hash functions and/or hash seeds the more the confidence that the underlying data is valid at each data site is increased.
- the data confirmation process may be repeated as many times as may be desired so as to obtain a specified or required confidence level, which may vary depending partly on the type of data stored and the significance or importance thereof.
- the data confirmation process could be repeated several times over a given period of time without significantly compromising the available bandwidth.
- FIGS. 5A and 5B help illustrate another embodiment for confirming data consistency as an alternative to or in addition to utilizing a hash seed as described above.
- a subset 506 e.g., Addresses 1-5 in FIG. 5A
- the result of the comparison of the hash values computed for the data corresponding to subset 506 may be representative of the validity of all the data 502 .
- a different subset 508 (e.g., Addresses 3-7) of addressable units from the data 502 may be hashed and compared with a hash value computed for replicated data at the second data site corresponding to the addressable units in the newly selected subset 508 .
- the result of the comparison of the hash values computed for the data corresponding to subset 508 may be representative of the validity of all the data 502 .
- the addressable units selected for the subsets 506 and 508 differ, if both the first and subsequent confirmation processes result in matching hash values, then the confidence that all the data 502 is valid at both sites increases. Any suitable number of additional data confirming processes may be run in a similar manner, with each process selecting a different subset of data from the previous process.
- Performing a plurality of confirmation processes utilizing various subsets 506 , 508 of data 502 increases the reliability of the data confirmation results for all the data 502 and reduces the probability of a collision resulting in an undetected error.
- the reliability is increased because if there is any invalid portion of data 502 at one of the sites, it is very likely that at least one of the selected subsets would result in a mismatch of hash values, thereby indicating an error in the data at one of the sites.
- the more times the process is repeated with varying subsets of data the more the confidence that the underlying data is valid at each data site is increased.
- subsets 506 , 508 need not be comprised of contiguous addressable units, but could be any organized subset of data.
- subsets 506 , 508 could include fewer or greater addressable units.
- the number of addressable units included in a subset and hashed during any given data confirmation process need not be the same as any previous confirmation process. That is, for any given data confirmation process, a subset could include any suitable number of addressable units without regard to how many addressable units are used in any previous or subsequent data confirmation process.
- any particular addressing method for addressing the addressable units may be utilized.
- the subsets need not be defined by traditional addressable units, but rather could be defined by any method, such as but not limited to, simply defining a starting and ending point within in the data 502 .
- any of the various embodiments for data confirmation of the present disclosure may be run at any time, and any of the various embodiments for data confirmation of the present disclosure may be triggered by any suitable method, such as but not limited to, triggered manually by an administrator, triggered automatically by the data storage subsystem or a controller or other processing device located at one of the data sites, triggered automatically based on a triggering event, or triggered randomly.
- a triggering event could be any type of event, including but not limited to, a particular date and/or time, when a particular level of network bandwidth is available, a transition from peak time to non-peak time, or vice versa, based on, for example, historical data or standardized data relating to peak times, or any combination of events, etc.
- any of the methods for data confirmation of the present disclosure may be run generally continuously or semi-continuously, for example, as a background process of the data storage subsystem.
- continuously and semi-continuously may be defined by the typical understanding of those terms as used in the art or defined by well-known dictionaries.
- continuously may be defined as an uninterrupted extension in space, time, or sequence
- semi-continuously may be defined as a substantially uninterrupted extension in space, time, or sequence.
- the term continuously may refer to embodiments of the present disclosure that are configured to run one or more data confirmation processes, simultaneously, sequentially, or both, over an extended period of time, such as for more than two consecutive hours, and are generally given the ability to consume resources without interruption for substantially the entire period of time.
- the term semi-continuously may refer to embodiments of the present disclosure that are configured to run one or more data confirmation processes, at least periodically, over an extended period of time, such as for more than two consecutive hours, and are generally given the ability to consume resources for at least more than half the time.
- any of the various embodiments for data confirmation of the present disclosure may be configured so as to run more heavily during periods of relatively increased system activity and less heavily during periods of relatively decreased system activity, so as not to significantly impact or interfere with normal or regular system performance or utilize significant amounts of network bandwidth that could otherwise be used for other system activity.
- any of the various embodiments for data confirmation of the present disclosure may be run generally continuously or semi-continuously, it is recognized that the data confirmation processes need not run at a consistent level for the entire period of time they are running continuously or semi-continuously and, indeed, could be periodically halted and restarted at various times for any desired or suitable reason, such as but not limited to, by administer request or based on system demand.
- any of the various embodiments for data confirmation may be run based on a predefined periodic schedule, such as but not limited to, at a specified time each day or week.
- one or more data reports may be generated from time to time identifying the results of any data confirmation processes run over a specified period of time. Such reports could include a statistical analysis of the validity of data between two or more data sites.
- a data report could provide a value indicative of the confidence that all, or a specified portion of, data at each data site is valid.
- the report(s) could be used to analyze whether the data confirmation processes should be modified to increase, or even decrease, if desired, the confidence level, such as by modifying how often the data confirmation processes run, when and for how long the data confirmation processes run, which data the data confirmation processes run on, the hash function or hash seed used, etc.
- the data storage system may automatically generate reports and utilize the data obtained from the report to automatically adjust the data confirmation processes in order to achieve a predefined or otherwise specified confidence level.
- the various embodiments of the present disclosure relating to systems and methods for confirming data consistency in a data storage environment provide significant advantages over conventional systems and methods for systems and methods for confirming data consistency in a data storage environment, which generally involve resending entire chunks of the underlying data between data sites for comparison.
- the various embodiments of the present disclosure may consume significantly less network bandwidth in order to confirm the validity of data between data sites, thus saving available bandwidth for other relatively more important, or even less important, system activity, such as but not limited to, initial replication of the data.
- the various embodiments of the present disclosure may be particularly useful in systems with relatively slower network links or connections or in systems where there is a significant amount of other communication which should have priority to the available bandwidth.
- repeated hash processes over periods of time with each repetition including a change in one or more of characteristic of the hashing process, as described herein can increase the confidence that the underlying data is, in fact, identical.
- the more passes completed and resulting in a positive match of hash values the more likely the underlying data is, in fact, the same.
- the owner of the data site where the original data is stored and the owner(s) of any data sites where replicated data is sent and stored are not the same. Without direct access to the data stores and supporting hardware and software at the replication sites, the owner of the original data site may, at best, only be able to rely on information provided by the owner(s) of the other data sites regarding the validity of data stored thereat.
- the owner of the original data site may like to have a method for confirming, through its own system, the reliability of the data stored at the replication sites. Preferably, the owner may like to do so without significant impact on its system's performance.
- the various embodiments of the present disclosure can fill this need.
Abstract
Description
Claims (16)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/680,265 US9002792B2 (en) | 2012-11-19 | 2012-11-19 | Confirming data consistency in a data storage environment |
US14/628,851 US9384232B2 (en) | 2012-11-19 | 2015-02-23 | Confirming data consistency in a data storage environment |
US15/072,431 US20160210307A1 (en) | 2012-11-19 | 2016-03-17 | Confirming data consistency in a data storage environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/680,265 US9002792B2 (en) | 2012-11-19 | 2012-11-19 | Confirming data consistency in a data storage environment |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/628,851 Continuation US9384232B2 (en) | 2012-11-19 | 2015-02-23 | Confirming data consistency in a data storage environment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140143206A1 US20140143206A1 (en) | 2014-05-22 |
US9002792B2 true US9002792B2 (en) | 2015-04-07 |
Family
ID=50728923
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/680,265 Active 2033-01-07 US9002792B2 (en) | 2012-11-19 | 2012-11-19 | Confirming data consistency in a data storage environment |
US14/628,851 Active US9384232B2 (en) | 2012-11-19 | 2015-02-23 | Confirming data consistency in a data storage environment |
US15/072,431 Abandoned US20160210307A1 (en) | 2012-11-19 | 2016-03-17 | Confirming data consistency in a data storage environment |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/628,851 Active US9384232B2 (en) | 2012-11-19 | 2015-02-23 | Confirming data consistency in a data storage environment |
US15/072,431 Abandoned US20160210307A1 (en) | 2012-11-19 | 2016-03-17 | Confirming data consistency in a data storage environment |
Country Status (1)
Country | Link |
---|---|
US (3) | US9002792B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150169671A1 (en) * | 2012-11-19 | 2015-06-18 | Compellent Technologies | Confirming data consistency in a data storage environment |
US9946534B1 (en) * | 2016-01-15 | 2018-04-17 | Jpmorgan Chase Bank, N.A. | Techniques for automated database deployment |
US11316664B2 (en) | 2019-04-05 | 2022-04-26 | Bank Of America Corporation | System for characterization and tracking of electronic data in a networked environment using cohesive information units |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248645B (en) * | 2012-02-08 | 2018-03-16 | 深圳市腾讯计算机系统有限公司 | BT off-line datas download system and method |
US9628438B2 (en) | 2012-04-06 | 2017-04-18 | Exablox | Consistent ring namespaces facilitating data storage and organization in network infrastructures |
US9552382B2 (en) | 2013-04-23 | 2017-01-24 | Exablox Corporation | Reference counter integrity checking |
EP3008647A4 (en) | 2013-06-12 | 2017-01-25 | Exablox Corporation | Hybrid garbage collection |
WO2014205286A1 (en) * | 2013-06-19 | 2014-12-24 | Exablox Corporation | Data scrubbing in cluster-based storage systems |
US9934242B2 (en) | 2013-07-10 | 2018-04-03 | Exablox Corporation | Replication of data between mirrored data sites |
US10248556B2 (en) | 2013-10-16 | 2019-04-02 | Exablox Corporation | Forward-only paged data storage management where virtual cursor moves in only one direction from header of a session to data field of the session |
JP5915629B2 (en) * | 2013-11-28 | 2016-05-11 | トヨタ自動車株式会社 | Communication method, data sharing system, and communication node in data sharing system |
US9985829B2 (en) | 2013-12-12 | 2018-05-29 | Exablox Corporation | Management and provisioning of cloud connected devices |
EP3103025B1 (en) | 2014-02-04 | 2019-07-10 | Exablox Corporation | Content based organization of file systems |
US9703801B2 (en) | 2014-03-25 | 2017-07-11 | Alfresco Software, Inc. | Synchronization of client machines with a content management system repository |
US9606870B1 (en) | 2014-03-31 | 2017-03-28 | EMC IP Holding Company LLC | Data reduction techniques in a flash-based key/value cluster storage |
US9396243B1 (en) * | 2014-06-27 | 2016-07-19 | Emc Corporation | Hash-based replication using short hash handle and identity bit |
US10025843B1 (en) | 2014-09-24 | 2018-07-17 | EMC IP Holding Company LLC | Adjusting consistency groups during asynchronous replication |
CN105630625A (en) * | 2014-10-29 | 2016-06-01 | 国际商业机器公司 | Method and device for detecting consistency between data copies |
US10706041B1 (en) | 2015-02-11 | 2020-07-07 | Gravic, Inc. | Systems and methods to profile transactions for end-state determination and latency reduction |
US9515678B1 (en) | 2015-05-11 | 2016-12-06 | Via Alliance Semiconductor Co., Ltd. | Hardware data compressor that directly huffman encodes output tokens from LZ77 engine |
US10027346B2 (en) | 2015-05-11 | 2018-07-17 | Via Alliance Semiconductor Co., Ltd. | Hardware data compressor that maintains sorted symbol list concurrently with input block scanning |
US9509336B1 (en) | 2015-05-11 | 2016-11-29 | Via Alliance Semiconductor Co., Ltd. | Hardware data compressor that pre-huffman encodes to decide whether to huffman encode a matched string or a back pointer thereto |
US9503122B1 (en) | 2015-05-11 | 2016-11-22 | Via Alliance Semiconductor Co., Ltd. | Hardware data compressor that sorts hash chains based on node string match probabilities |
US9628111B2 (en) | 2015-05-11 | 2017-04-18 | Via Alliance Semiconductor Co., Ltd. | Hardware data compressor with multiple string match search hash tables each based on different hash size |
US9509335B1 (en) | 2015-05-11 | 2016-11-29 | Via Alliance Semiconductor Co., Ltd. | Hardware data compressor that constructs and uses dynamic-prime huffman code tables |
US9509337B1 (en) | 2015-05-11 | 2016-11-29 | Via Alliance Semiconductor Co., Ltd. | Hardware data compressor using dynamic hash algorithm based on input block type |
US10242015B1 (en) * | 2015-08-18 | 2019-03-26 | EMC IP Holding Company LLC | Handling weakening of hash functions by using epochs |
US10474654B2 (en) | 2015-08-26 | 2019-11-12 | Storagecraft Technology Corporation | Structural data transfer over a network |
US10152527B1 (en) | 2015-12-28 | 2018-12-11 | EMC IP Holding Company LLC | Increment resynchronization in hash-based replication |
US10324635B1 (en) | 2016-03-22 | 2019-06-18 | EMC IP Holding Company LLC | Adaptive compression for data replication in a storage system |
US10310951B1 (en) | 2016-03-22 | 2019-06-04 | EMC IP Holding Company LLC | Storage system asynchronous data replication cycle trigger with empty cycle detection |
US10565058B1 (en) * | 2016-03-30 | 2020-02-18 | EMC IP Holding Company LLC | Adaptive hash-based data replication in a storage system |
US9959063B1 (en) | 2016-03-30 | 2018-05-01 | EMC IP Holding Company LLC | Parallel migration of multiple consistency groups in a storage system |
US10095428B1 (en) | 2016-03-30 | 2018-10-09 | EMC IP Holding Company LLC | Live migration of a tree of replicas in a storage system |
US9959073B1 (en) | 2016-03-30 | 2018-05-01 | EMC IP Holding Company LLC | Detection of host connectivity for data migration in a storage system |
US9846553B2 (en) | 2016-05-04 | 2017-12-19 | Exablox Corporation | Organization and management of key-value stores |
US20170351845A1 (en) * | 2016-06-01 | 2017-12-07 | Invio, Inc. | Research study data acquisition and quality control systems and methods |
CN107070645B (en) * | 2016-12-30 | 2020-06-16 | 华为技术有限公司 | Method and system for comparing data of data table |
US10255314B2 (en) | 2017-03-16 | 2019-04-09 | International Business Machines Corporation | Comparison of block based volumes with ongoing inputs and outputs |
US10437855B1 (en) * | 2017-07-28 | 2019-10-08 | EMC IP Holding Company LLC | Automatic verification of asynchronously replicated data |
JP6848766B2 (en) * | 2017-08-23 | 2021-03-24 | 株式会社Jvcケンウッド | Data tampering detection device, data tampering detection method, and data structure of image data |
US10606828B2 (en) * | 2017-10-19 | 2020-03-31 | Jpmorgan Chase Bank, N.A. | Storage correlation engine |
US11036677B1 (en) * | 2017-12-14 | 2021-06-15 | Pure Storage, Inc. | Replicated data integrity |
US10776038B2 (en) | 2018-11-26 | 2020-09-15 | Bank Of America Corporation | Systems and methods for defining replication of data |
US11551292B2 (en) | 2020-04-02 | 2023-01-10 | Mastercard International Incorporated | Systems and methods for validating repeating data |
Citations (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6332163B1 (en) * | 1999-09-01 | 2001-12-18 | Accenture, Llp | Method for providing communication services over a computer network system |
US20020048369A1 (en) * | 1995-02-13 | 2002-04-25 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20020049788A1 (en) * | 2000-01-14 | 2002-04-25 | Lipkin Daniel S. | Method and apparatus for a web content platform |
US20020073080A1 (en) * | 2000-01-14 | 2002-06-13 | Lipkin Daniel S. | Method and apparatus for an information server |
US20020073236A1 (en) * | 2000-01-14 | 2002-06-13 | Helgeson Christopher S. | Method and apparatus for managing data exchange among systems in a network |
US6529909B1 (en) * | 1999-08-31 | 2003-03-04 | Accenture Llp | Method for translating an object attribute converter in an information services patterns environment |
US6550057B1 (en) * | 1999-08-31 | 2003-04-15 | Accenture Llp | Piecemeal retrieval in an information services patterns environment |
US6606660B1 (en) * | 1999-08-31 | 2003-08-12 | Accenture Llp | Stream-based communication in a communication services patterns environment |
US20030191719A1 (en) * | 1995-02-13 | 2003-10-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20050234909A1 (en) * | 2004-04-15 | 2005-10-20 | International Business Machines Corporation | Method, computer program product, and data processing system for source verifiable audit logging |
US20060010227A1 (en) * | 2004-06-01 | 2006-01-12 | Rajeev Atluri | Methods and apparatus for accessing data from a primary data storage system for secondary storage |
US20060288030A1 (en) * | 2005-06-09 | 2006-12-21 | Ramon Lawrence | Early hash join |
US20070100793A1 (en) * | 2005-10-20 | 2007-05-03 | Brown Douglas P | Identifying database request sources |
US20070130231A1 (en) * | 2005-12-06 | 2007-06-07 | Brown Douglas P | Closed-loop supportability architecture |
US20070244920A1 (en) * | 2003-12-12 | 2007-10-18 | Sudarshan Palliyil | Hash-Based Access To Resources in a Data Processing Network |
US20070271570A1 (en) * | 2006-05-17 | 2007-11-22 | Brown Douglas P | Managing database utilities to improve throughput and concurrency |
US20070282951A1 (en) * | 2006-02-10 | 2007-12-06 | Selimis Nikolas A | Cross-domain solution (CDS) collaborate-access-browse (CAB) and assured file transfer (AFT) |
US20090019547A1 (en) * | 2003-12-12 | 2009-01-15 | International Business Machines Corporation | Method and computer program product for identifying or managing vulnerabilities within a data processing network |
US20090018996A1 (en) * | 2007-01-26 | 2009-01-15 | Herbert Dennis Hunt | Cross-category view of a dataset using an analytic platform |
US7613945B2 (en) * | 2003-08-14 | 2009-11-03 | Compellent Technologies | Virtual disk drive system and method |
US20100169452A1 (en) * | 2004-06-01 | 2010-07-01 | Rajeev Atluri | Causation of a data read operation against a first storage system by a server associated with a second storage system according to a host generated instruction |
US20100332401A1 (en) * | 2009-06-30 | 2010-12-30 | Anand Prahlad | Performing data storage operations with a cloud storage environment, including automatically selecting among multiple cloud storage sites |
US20120233251A1 (en) * | 2011-03-08 | 2012-09-13 | Rackspace Us, Inc. | Virtual Multi-Cluster Clouds |
US20130060868A1 (en) * | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for identifying a communications partner |
US8560503B1 (en) * | 2006-01-26 | 2013-10-15 | Netapp, Inc. | Content addressable storage system |
US8620886B1 (en) * | 2011-09-20 | 2013-12-31 | Netapp Inc. | Host side deduplication |
US20140108474A1 (en) * | 2012-10-16 | 2014-04-17 | Rackspace Us, Inc. | System and Method for Exposing Cloud Stored Data to a Content Delivery Network |
US8713282B1 (en) * | 2011-03-31 | 2014-04-29 | Emc Corporation | Large scale data storage system with fault tolerance |
US20140181041A1 (en) * | 2012-12-21 | 2014-06-26 | Zetta, Inc. | Distributed data store |
US20140201126A1 (en) * | 2012-09-15 | 2014-07-17 | Lotfi A. Zadeh | Methods and Systems for Applications for Z-numbers |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7941401B2 (en) * | 2005-05-09 | 2011-05-10 | Gemstone Systems, Inc. | Distributed data management system |
US8161353B2 (en) * | 2007-12-06 | 2012-04-17 | Fusion-Io, Inc. | Apparatus, system, and method for validating that a correct data segment is read from a data storage device |
US20120136846A1 (en) * | 2010-11-30 | 2012-05-31 | Haoyu Song | Methods of hashing for networks and systems thereof |
US8898204B1 (en) * | 2011-10-21 | 2014-11-25 | Applied Micro Circuits Corporation | System and method for controlling updates of a data structure |
CA2883313C (en) * | 2012-08-30 | 2020-06-16 | Los Alamos National Security, Llc | Multi-factor authentication using quantum communication |
US9002792B2 (en) * | 2012-11-19 | 2015-04-07 | Compellent Technologies | Confirming data consistency in a data storage environment |
-
2012
- 2012-11-19 US US13/680,265 patent/US9002792B2/en active Active
-
2015
- 2015-02-23 US US14/628,851 patent/US9384232B2/en active Active
-
2016
- 2016-03-17 US US15/072,431 patent/US20160210307A1/en not_active Abandoned
Patent Citations (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020048369A1 (en) * | 1995-02-13 | 2002-04-25 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20030191719A1 (en) * | 1995-02-13 | 2003-10-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6529909B1 (en) * | 1999-08-31 | 2003-03-04 | Accenture Llp | Method for translating an object attribute converter in an information services patterns environment |
US6550057B1 (en) * | 1999-08-31 | 2003-04-15 | Accenture Llp | Piecemeal retrieval in an information services patterns environment |
US6606660B1 (en) * | 1999-08-31 | 2003-08-12 | Accenture Llp | Stream-based communication in a communication services patterns environment |
US6332163B1 (en) * | 1999-09-01 | 2001-12-18 | Accenture, Llp | Method for providing communication services over a computer network system |
US20020049788A1 (en) * | 2000-01-14 | 2002-04-25 | Lipkin Daniel S. | Method and apparatus for a web content platform |
US20020073080A1 (en) * | 2000-01-14 | 2002-06-13 | Lipkin Daniel S. | Method and apparatus for an information server |
US20020073236A1 (en) * | 2000-01-14 | 2002-06-13 | Helgeson Christopher S. | Method and apparatus for managing data exchange among systems in a network |
US7613945B2 (en) * | 2003-08-14 | 2009-11-03 | Compellent Technologies | Virtual disk drive system and method |
US20070244920A1 (en) * | 2003-12-12 | 2007-10-18 | Sudarshan Palliyil | Hash-Based Access To Resources in a Data Processing Network |
US20090019547A1 (en) * | 2003-12-12 | 2009-01-15 | International Business Machines Corporation | Method and computer program product for identifying or managing vulnerabilities within a data processing network |
US8024306B2 (en) * | 2003-12-12 | 2011-09-20 | International Business Machines Corporation | Hash-based access to resources in a data processing network |
US20050234909A1 (en) * | 2004-04-15 | 2005-10-20 | International Business Machines Corporation | Method, computer program product, and data processing system for source verifiable audit logging |
US20060010227A1 (en) * | 2004-06-01 | 2006-01-12 | Rajeev Atluri | Methods and apparatus for accessing data from a primary data storage system for secondary storage |
US20100169452A1 (en) * | 2004-06-01 | 2010-07-01 | Rajeev Atluri | Causation of a data read operation against a first storage system by a server associated with a second storage system according to a host generated instruction |
US20060288030A1 (en) * | 2005-06-09 | 2006-12-21 | Ramon Lawrence | Early hash join |
US20070100793A1 (en) * | 2005-10-20 | 2007-05-03 | Brown Douglas P | Identifying database request sources |
US20070130231A1 (en) * | 2005-12-06 | 2007-06-07 | Brown Douglas P | Closed-loop supportability architecture |
US8560503B1 (en) * | 2006-01-26 | 2013-10-15 | Netapp, Inc. | Content addressable storage system |
US20070282951A1 (en) * | 2006-02-10 | 2007-12-06 | Selimis Nikolas A | Cross-domain solution (CDS) collaborate-access-browse (CAB) and assured file transfer (AFT) |
US20070271570A1 (en) * | 2006-05-17 | 2007-11-22 | Brown Douglas P | Managing database utilities to improve throughput and concurrency |
US20090018996A1 (en) * | 2007-01-26 | 2009-01-15 | Herbert Dennis Hunt | Cross-category view of a dataset using an analytic platform |
US20100332401A1 (en) * | 2009-06-30 | 2010-12-30 | Anand Prahlad | Performing data storage operations with a cloud storage environment, including automatically selecting among multiple cloud storage sites |
US20120233251A1 (en) * | 2011-03-08 | 2012-09-13 | Rackspace Us, Inc. | Virtual Multi-Cluster Clouds |
US8713282B1 (en) * | 2011-03-31 | 2014-04-29 | Emc Corporation | Large scale data storage system with fault tolerance |
US20130060868A1 (en) * | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for identifying a communications partner |
US8620886B1 (en) * | 2011-09-20 | 2013-12-31 | Netapp Inc. | Host side deduplication |
US20140201126A1 (en) * | 2012-09-15 | 2014-07-17 | Lotfi A. Zadeh | Methods and Systems for Applications for Z-numbers |
US20140108474A1 (en) * | 2012-10-16 | 2014-04-17 | Rackspace Us, Inc. | System and Method for Exposing Cloud Stored Data to a Content Delivery Network |
US20140181041A1 (en) * | 2012-12-21 | 2014-06-26 | Zetta, Inc. | Distributed data store |
Non-Patent Citations (3)
Title |
---|
Júnior, Correia, and Alfrânio Tavares. "Practical database replication." Masters Thesis, University of Minho, 2010, pp. 1-126. * |
Oppegaard, Martin Christoffer Aasen. "Evaluation of Performance and Space Utilisation When Using Snapshots in the ZFS and Hammer File Systems," Masters Thesis, Oslo University Collage, Spring 2009, pp. 1-208. * |
Smaldone, Stephen D. "Improving the performance, availability, and security of data access for opportunistic mobile computing." PhD diss., Rutgers University-Graduate School-New Brunswick, 2011, pp. 1-163. * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150169671A1 (en) * | 2012-11-19 | 2015-06-18 | Compellent Technologies | Confirming data consistency in a data storage environment |
US9384232B2 (en) * | 2012-11-19 | 2016-07-05 | Dell International L.L.C. | Confirming data consistency in a data storage environment |
US20160210307A1 (en) * | 2012-11-19 | 2016-07-21 | Dell International L.L.C. | Confirming data consistency in a data storage environment |
US9946534B1 (en) * | 2016-01-15 | 2018-04-17 | Jpmorgan Chase Bank, N.A. | Techniques for automated database deployment |
US11316664B2 (en) | 2019-04-05 | 2022-04-26 | Bank Of America Corporation | System for characterization and tracking of electronic data in a networked environment using cohesive information units |
Also Published As
Publication number | Publication date |
---|---|
US20150169671A1 (en) | 2015-06-18 |
US20140143206A1 (en) | 2014-05-22 |
US9384232B2 (en) | 2016-07-05 |
US20160210307A1 (en) | 2016-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9384232B2 (en) | Confirming data consistency in a data storage environment | |
US10481978B2 (en) | Optimal slice encoding strategies within a dispersed storage unit | |
US20190095128A1 (en) | Expanding slice count in response to low-level failures | |
US10387063B2 (en) | Securing encoding data slices using an integrity check value list | |
US10466914B2 (en) | Verifying authorized access in a dispersed storage network | |
US10440107B2 (en) | Protecting encoded data slice integrity at various levels | |
US20190004727A1 (en) | Using a namespace to augment de-duplication | |
US10802732B2 (en) | Multi-level stage locality selection on a large system | |
US20190005261A1 (en) | Secure shared vault with encrypted private indices | |
US20170132079A1 (en) | Rebuilding and verifying an encoded data slice utilizing slice verification information | |
US10565392B2 (en) | Secure and verifiable update operations | |
US10469406B2 (en) | Partial task execution in a dispersed storage network | |
US11237904B2 (en) | Tracking data access in a dispersed storage network | |
US20190087599A1 (en) | Compressing a slice name listing in a dispersed storage network | |
US11204836B1 (en) | Using trap slices for anomaly detection in a distributed storage network | |
US10958731B2 (en) | Indicating multiple encoding schemes in a dispersed storage network | |
US10506045B2 (en) | Memory access using deterministic function and secure seed | |
US20170357666A1 (en) | Implementing queues (fifo) and stacks (filo) on top dispersed storage | |
US10481980B2 (en) | Enabling segmented source data introspection within dispersed storage network (DSN) memory | |
US11115221B2 (en) | Verifying a rebuilt encoded data slice using slice verification information | |
US20190007380A1 (en) | De-duplication of data streams | |
US20170322743A1 (en) | Encoding slice verification information to support verifiable rebuilding | |
US10002047B2 (en) | Read-if-not-revision-equals protocol message | |
US10289342B2 (en) | Data access optimization protocol in a dispersed storage network | |
US20190018741A1 (en) | Dynamic storage map construction in a distributed storage system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: COMPELLENT TECHNOLOGIES, MINNESOTA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PITTELKO, MICHAEL H.;REEL/FRAME:029319/0253 Effective date: 20121107 |
|
AS | Assignment |
Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT, TEXAS Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:031897/0348 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT (TERM LOAN);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031899/0261 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, TEXAS Free format text: PATENT SECURITY AGREEMENT (ABL);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031898/0001 Effective date: 20131029 Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FI Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:031897/0348 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH Free format text: PATENT SECURITY AGREEMENT (TERM LOAN);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031899/0261 Effective date: 20131029 Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, TE Free format text: PATENT SECURITY AGREEMENT (ABL);ASSIGNORS:DELL INC.;APPASSURE SOFTWARE, INC.;ASAP SOFTWARE EXPRESS, INC.;AND OTHERS;REEL/FRAME:031898/0001 Effective date: 20131029 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: MERGER;ASSIGNOR:COMPELLENT TECHNOLOGIES, INC.;REEL/FRAME:038058/0502 Effective date: 20160303 |
|
AS | Assignment |
Owner name: COMPELLANT TECHNOLOGIES, INC., MINNESOTA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: SECUREWORKS, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: PEROT SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: DELL INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 Owner name: APPASSURE SOFTWARE, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040065/0216 Effective date: 20160907 |
|
AS | Assignment |
Owner name: DELL INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: APPASSURE SOFTWARE, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: SECUREWORKS, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: COMPELLENT TECHNOLOGIES, INC., MINNESOTA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: PEROT SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040040/0001 Effective date: 20160907 Owner name: COMPELLENT TECHNOLOGIES, INC., MINNESOTA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: APPASSURE SOFTWARE, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: SECUREWORKS, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: PEROT SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040065/0618 Effective date: 20160907 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
AS | Assignment |
Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MOZY, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MAGINATICS LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL INTERNATIONAL, L.L.C., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: AVENTAIL LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |